4Linda Volonino,Reynaldo Anzaldua,Jana Godwin.Computer forensics:Principles and practices[M].Prentice Hall,2006:10-21. 被引量:1
5William Stallings.Cryptography and network security:Principles and practice[M].4th Ed.Prentice Hall,2005:103-320. 被引量:1
6Ashwin Swaminathan.Digital image forensics via intrinsic fingerprints[J].IEEE Transactions on Information Forensics and Security,2008,3(1):101-117. 被引量:1